What is the general motivation behind an Advanced Persistent Threat (APT)?
What is the general motivation behind an Advanced Persistent Threat (APT)?A . PublicityB . Random disruptionC . Financial gainD . RevengeView AnswerAnswer: C Explanation: The general motivation behind an APT is often financial gain. Threat actors conducting APTs aim to gain unauthorized access to valuable information, such as financial data...
Which encryption method is used to secure data while it is being actively used and processed by an application?
Which encryption method is used to secure data while it is being actively used and processed by an application?A . Asymmetric encryptionB . Homomorphic encryptionC . Secure Sockets Layer (SSL)D . Hash encryptionView AnswerAnswer: B Explanation: Homomorphic encryption is a form of encryption that allows computations to be performed on...
Which of the following is true regarding secure web gateways (SWG)?
Which of the following is true regarding secure web gateways (SWG)?A . SWGs provide protection against malware and advanced threatsB . SWGs are primarily used to secure internal web applications.C . SWGs are no longer necessary with the advent of cloud-based applications.D . SWGs can only be deployed on-premisesView AnswerAnswer:...
Which of the following services or protocols can be used to ensure the security and compliance of an organization's network?
Which of the following services or protocols can be used to ensure the security and compliance of an organization's network?A . NTP (Network Time Protocol)B . SNMP (Simple Network Management Protocol)C . DHCP (Dynamic Host Configuration Protocol)D . DNS (Domain Name System)View AnswerAnswer: B Explanation: Option 1: NTP is a...
Which of the following is the most secure and recommended method for storing sensitive user data in a database?
Which of the following is the most secure and recommended method for storing sensitive user data in a database?A . Storing the data in plain textB . Using symmetric encryptionC . Using hashing algorithmsD . Using asymmetric encryptionView AnswerAnswer: C Explanation: Option 1: Incorrect. Storing sensitive user data in plain...
Which of the following is a common authentication protocol used in wireless networks?
Which of the following is a common authentication protocol used in wireless networks?A . FTPB . WPAC . SSHD . SMTPView AnswerAnswer: B Explanation: WPA (Wi-Fi Protected Access) is a widely used authentication protocol for securing wireless networks. It provides stronger security than the older WEP (Wired Equivalent Privacy) protocol...
What are botnets?
What are botnets?A . An attack that manipulates individuals into revealing sensitive information or performing certain actions.B . A network of compromised computers controlled by a central entity to carry out malicious activities.C . A form of cyber attack that attempts to gain unauthorized access to a network.D . A...
Which of the following represents a strong passphrase for securing a wireless SoHo network?
Which of the following represents a strong passphrase for securing a wireless SoHo network?A . 12345678B . P@ssword!C . CorrectHorseBatteryStapleD . jumpr0peView AnswerAnswer: C Explanation: A strong passphrase should be long, include a combination of uppercase and lowercase letters, numbers, and special characters. "CorrectHorseBatteryStaple" represents a strong passphrase as it...
What is a man-in-the-middle attack?
What is a man-in-the-middle attack?A . An attack that intercepts and manipulates communication between two parties.B . An attack that exploits vulnerabilities in a device's software.C . An attack that targets Internet of Things devices.D . An attack where an insider intentionally releases sensitive information.View AnswerAnswer: A Explanation: A man-in-the-middle...
What is the main difference between a public and a private network?
What is the main difference between a public and a private network?A . Public networks are secured, while private networks are notB . Private networks are more expensive to set up than public networksC . Public networks use public IP addresses, while private networks use private IP addressesD . Private...